Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: vxcan: vxcan_xmit: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the canfd_frame cfd which aliases skb memory is accessed after the netif_rx_ni().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.12, < 4.14.218 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105Patch
- https://git.kernel.org/stable/c/75854cad5d80976f6ea0f0431f8cedd3bcc475cbPatch
- https://git.kernel.org/stable/c/9b820875a32a3443d67bfd368e93038354e98052Patch
- https://git.kernel.org/stable/c/a24476b37167816e6352ca1a2cf3769847774f70Patch
- https://git.kernel.org/stable/c/e771a874076115df8bff27d325edfd2340e4ec69Patch
FAQ
What is CVE-2021-47669?
CVE-2021-47669 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: can: vxcan: vxcan_xmit: fix use after free bug After calling netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the canfd_...
How severe is CVE-2021-47669?
CVE-2021-47669 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47669?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.